## ## SPDX-FileCopyrightText: 2021 Splunk, Inc. ## SPDX-License-Identifier: LicenseRef-Splunk-8-2021 ## ## ## LOOKUP [juniper_transport_protocols_lookup] filename = juniper_transport_protocols.csv [juniper_netscreen_firewall_ids_info_lookup] filename = juniper_netscreen_firewall_ids_info.csv ###### Juniper Firewall (Netscreen Firewall) ###### ## TRANSFORMS [force_host_for_netscreen_firewall] DEST_KEY = MetaData:Host REGEX = \s+([^\s]+)\:\s+NetScreen\s+device_id\= FORMAT = host::$1 [force_sourcetype_for_netscreen_firewall] DEST_KEY = MetaData:Sourcetype REGEX = \s+NetScreen\s+device_id\= FORMAT = sourcetype::netscreen:firewall ## LOOKUP [juniper_netscreen_firewall_action_lookup] filename = juniper_netscreen_firewall_actions.csv ## REPORT [dest_translated_for_netscreen_firewall] REGEX = dst-xlated\s+ip\s*=\s*(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})\s+port\s*=\s*(\d+) FORMAT = dest_translated_ip::$1 dest_translated_port::$2 [src_translated_for_netscreen_firewall] REGEX = src-xlated\s+ip\s*=\s*(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})\s+port\s*=\s*(\d+) FORMAT = src_translated_ip::$1 src_translated_port::$2 [zone_for_netscreen_firewall] REGEX = src\s+zone\=(\S+)*\s+dst\s+zone\=(\S+)* FORMAT = src_zone::$1 dest_zone::$2 [app_for_netscreen_firewall] REGEX = (?[Nn]et[Ss]creen).*(?:Password\s+authentication|Login\s+attempt|attempt\s+by\s+admin|admin\s+authentication|for\s+admin\s+user|system-alert-) [dvc_for_netscreen_firewall] REGEX = (?[\w\d\-\.]+)\s+[\w\d\-\.]+\s*:\s*[Nn]et[Ss]creen ## Netscreen Authentication Extractions [local_admin_auth_for_netscreen_firewall] REGEX = (?:([\w\d\-\.]+)\s+[\w\d\-\.]+\s*)?:\s*(NetScreen).*?Local\s+admin\s+authentication\s+(failed|successful)\s+for\s+login\s+name\s+([^\s:]+) FORMAT = dest::$1 vendor_app::$2 vendor_action::$3 netscreen_user::$4 [login_refused_for_netscreen_firewall] REGEX = (?:([\w\d\-\.]+)\s+[\w\d\-\.]+\s*)?:\s*(NetScreen).*Login\s+attempt\s+by\s+admin\s+(\S+)\s+from\s+(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})\s+is\s+(refused) FORMAT = dest::$1 vendor_app::$2 netscreen_user::$3 src_ip::$4 vendor_action::$5 [password_auth_for_netscreen_firewall] REGEX = (?:([\w\d\-\.]+)\s+[\w\d\-\.]+\s*)?:\s*(NetScreen).*?Password\s+authentication\s+(failed|successful)\s+for\s+admin\s+user\s+[\'\"]\s*([^\'\"\s]+)\s*[\'\"]\s+at\s+host\s+(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}|.+?)[\s\.]*\s FORMAT = dest::$1 vendor_app::$2 vendor_action::$3 netscreen_user::$4 dest::$5 ## Netscreen Network Change Extractions [change_src_dest_for_netscreen_firewall] REGEX = system\-notification\-00018\:.*from\s+host\s+(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})\s+to\s+(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})\: FORMAT = src_ip::$1 dest_ip::$2 ## Modify firewall messages for ScreenOS 6.0.0 Rev2 and later [firewall_change_for_netscreen_firewall] REGEX = system\-notification\-00018\:\s.*\swas\s(\w+).*\sby\s([^\s]*)\svia\s([^\s]*)\s FORMAT = vendor_action::$1 netscreen_user::$2 command::$3 [policy_id_for_netscreen_firewall] REGEX = system\-notification\-00018\:.*?[Pp]olicy\s*(?:ID\s*|\()(\d+) FORMAT = policy_id::$1 [translation_log_for_netscreen_firewall] REGEX = \s+([^\s]+)\:\s+(NetScreen) device_id\=([^\s]+)\s+.*?system\-information.*?\:\s+IP\s+address\s+(\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3})\s+.*?assigned\s+to\s+(\w+)\. FORMAT = dest::$1 vendor_app::$2 device_id::$3 ip::$4 mac::$5 [user_for_netscreen_firewall_restart] REGEX = system\-information\-\w+\:.*System\s+halt\-reboot\s+by\s+\'([^\']+)\' FORMAT = netscreen_user::$1 [login_failed_for_netscreen_firewall] REGEX = (?:([\w\d\-\.]+)\s+[\w\d\-\.]+\s*)?:\s*(NetScreen).*Login\s+attempt\s+to\s+system\s+by\s+admin\s+(\S+)\s+via\s+Telnet\s+from\s+(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})\s*:\s*(\d+)\s+has\s+(failed) FORMAT = dest::$1 vendor_app::$2 netscreen_user::$3 src_ip::$4 src_port::$5 vendor_action::$6 ## Alert messages for ScreenOS 6.3.0 Rev5, Published: 2014-12-17 [alert_first_part_for_netscreen_firewall] REGEX = \s+(NetScreen)\s+.*system\-alert\-(\w+):\s+(.*) FORMAT = vendor_app::$1 alert_id::$2 body::$3 [alert_rest_part_for_netscreen_firewall] REGEX = system\-alert\-\w+:\s+\w[^!]+!\s+From\s+(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})\:?(\d+)?\s+to\s+(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})\:?(\d+)?,\s+proto\s+(\w+)\s+\(zone\s+(\w+),?\s+int\s+([^\s)]+)\)\.\s+Occurred\s+(\d+)\s+times FORMAT = src_ip::$1 src_port::$2 dest_ip::$3 dest_port::$4 protocol::$5 zone::$6 interface_name::$7 frequency::$8 ###### Juniper Restarts ###### ## REPORT [juniper_restart_field] REGEX = device_id=([\w\-]+).*System\shalt-(reboot)\sby\s'\w+' FORMAT = dest::$1 vendor_action::$2 ###### Juniper JunOS IDP ###### ## TRANSFORMS [force_sourcetype_for_junos_idp_structured] DEST_KEY = MetaData:Sourcetype REGEX = \s+RT_IDP\s+\-\s+\w+\s+\[junos@2636 FORMAT = sourcetype::juniper:junos:idp:structured [force_sourcetype_for_junos_idp] DEST_KEY = MetaData:Sourcetype REGEX = \s+RT_IDP:\s+ FORMAT = sourcetype::juniper:junos:idp ## REPORT [message_tag_for_junos_idp] REGEX = RT_IDP\s*(?:\:|\-)\s+(?[\w]+) [dvc_for_junos_idp] REGEX = (?\S+)\s+RT_IDP [auto_kv_for_junos_idp] ## FIELDS: IDP: at epoch-time, message-type Attack log destination-address/destination-port> for protocol-name protocol and service service-name application application-name by rule rule-name of rulebase rulebase-name in policy policy-name. attack: id=export-id, repeat=repeat-count, action=action, threat-severity=threat-severity, name=attack-name, NAT nat-destination-address:nat-destination-port>, time-elapsed=elapsed-time, inbytes=inbound-bytes, outbytes=outbound-bytes, inpackets=inbound-packets, outpackets=outbound-packets, intf:source-zone-name:source-interface-name->destination-zone-name:destination-interface-name, packet-log-id: packet-log-id, alert=alert, username=username, roles=roles, xff-header=xff-header and misc-message message REGEX = (?\S+)\s+Attack\s+log\s+<(?\d+\.\d+\.\d+\.\d+)(?:\/|\:)(?\d+)->(?\d+\.\d+\.\d+\.\d+)(?:\/|\:)(?\d+)>\s+for\s+(?\S+)\s+protocol\s+and\s+service\s+(?\S+)\s+application\s+(?\S+)\s+by\s+rule\s+(?\S+)\s+of\s+rulebase\s+(?\S+)\s+in\s+policy\s+(?\S+)\..*NAT\s+<(?\d+\.\d+\.\d+\.\d+)(?:\/|\:)(?\d+)->(?\d+\.\d+\.\d+\.\d+)(?:\/|\:)(?\d+)>.*intf:(?[^:]+):(?[^>]+)->(?[^:]+):(?[^,]+),\s*packet-log-id:\s*(?\w+).*and\s+misc-message\s+(?\S+) ###### Juniper JunOS FW ###### ## TRANSFORMS [force_sourcetype_for_junos_firewall] DEST_KEY = MetaData:Sourcetype REGEX = \s+(?:RT_FLOW|RT_IDS|ESWD_STP_STATE_CHANGE_INFO|ESWD_DAI_FAILED|PFE_FW_SYSLOG_ETH_IP|RT_UTM):\s+ FORMAT = sourcetype::juniper:junos:firewall [force_sourcetype_for_junos_firewall_structured] DEST_KEY = MetaData:Sourcetype REGEX = \s+(?:RT_FLOW|RT_IDS|RT_UTM)\s+\-\s+\w+\s+\[junos@2636 FORMAT = sourcetype::juniper:junos:firewall:structured [force_sourcetype_for_junos_firewall_rpd] DEST_KEY = MetaData:Sourcetype REGEX = rpd\[\d+\]\s*: FORMAT = sourcetype::juniper:junos:firewall ## REPORT [message_tag_for_junos_fw] REGEX = (?:RT_FLOW|RT_IDS|RT_UTM|junos-alg)\s*(?:\:|\-)\s+(?\w+) [dvc_for_junos_fw] REGEX = (?\S+)\s+(?:RT_FLOW[:-]|RT_IDS|RT_UTM|junos-alg) [file_name_for_junos_fw] REGEX = \sfilename\s*=\s*['\"]?(?:\S+[\\\/])*(?.+?)['\"]*(?:\s|\]) [auto_kv_for_rt_screen] ## FIELDS: signature source: source-address:source-port, destination: destination-address:destination-port, zone name: source-zone-name, interface name: dest-interface, action: action REGEX = (?:RT_SCREEN_UDP|RT_SCREEN_TCP|RT_SCREEN_ICMP)\s*\:\s*(?.+)\s+source\s*:\s*(?\d+\.\d+\.\d+\.\d+):?(?\d+)?,\s*destination\s*:\s*(?\d+\.\d+\.\d+\.\d+):?(?\d+)?,\s*zone\sname\s*:\s*(?[^,]+),\s*interface\sname\s*:\s*(?[^,]+),\s*action\s*:\s*(?\S+) [auto_kv_for_rt_flow_session_create] ## FIELDS: session created source-address/source-port->destination-address/destination-port 0xconnection-tag service-name nat-source-address/nat-source-port->nat-destination-address/nat-destination-port 0xnat-connection-tag src-nat-rule-type src-nat-rule-name dst-nat-rule-type dst-nat-rule-name protocol-id policy-name source-zone-name destination-zone-name session-id-32 username(roles) packet-incoming-interface application nested-application encrypted application-category application-sub-category application-risk application-characteristics src-vrf-grp dst-vrf-grp REGEX = session\s+created\s+(?\d+\.\d+\.\d+\.\d+)\/(?\d+)->(?\d+\.\d+\.\d+\.\d+)\/(?\d+)\s+(?(?:0x|0X)[0-9A-Fa-f]{0,16})\s+(?\S+)\s+(?\d+\.\d+\.\d+\.\d+)\/(?\d+)->(?\d+\.\d+\.\d+\.\d+)\/(?\d+)\s+(?(?:0x|0X)[0-9A-Fa-f]{0,16})\s+(?(?:\S+|(?:static|source)\s\S+))\s+(?\S+)\s+(?(?:\S+|(?:static|destination)\s\S+))\s+(?\S+)\s+(?\d+)\s+(?\S+)\s+(?\S+)\s+(?\S+)\s+(?\d+)\s+(?\S+)\((?\S+)\)\s+(?\S+)\s+(?\S+)\s+(?\S+)\s+(?\S+)\s*(?\S+)?\s*(?\S+)?\s*(?\S+)?\s*(?(?:N\/A)|(?:.*;)|\S+)?\s*(?\S+)?\s*(?\S+)? [auto_kv_for_rt_flow_session_close] ## FIELDS: session closed reason: source-address/source-port->destination-address/destination-port 0xconnection-tag service-name nat-source-address/nat-source-port->nat-destination-address/nat-destination-port 0xnat-connection-tag src-nat-rule-type src-nat-rule-name dst-nat-rule-type dst-nat-rule-name protocol-id policy-name source-zone-name destination-zone-name session-id-32 packets-from-client(bytes-from-client) packets-from-server(bytes-from-server) elapsed-time application nested-application username(roles) packet-incoming-interface encrypted application-category application-sub-category application-risk application-characteristics secure-web-proxy-session-type peer-session-id peer-source-address/peer-source-port->peer-destination-address/peer-destination-port hostname src-vrf-grp dst-vrf-grp REGEX = session\s+closed\s+(?[^:]+): (?\d+\.\d+\.\d+\.\d+)\/(?\d+)->(?\d+\.\d+\.\d+\.\d+)\/(?\d+)\s+(?(?:0x|0X)[0-9A-Fa-f]{0,16})\s+(?\S+)\s+(?\d+\.\d+\.\d+\.\d+)\/(?\d+)->(?\d+\.\d+\.\d+\.\d+)\/(?\d+)\s+(?(?:0x|0X)[0-9A-Fa-f]{0,16})\s+(?(?:\S+|(?:static|source)\s\S+))\s+(?\S+)\s+(?(?:\S+|(?:static|destination)\s\S+))\s+(?\S+)\s+(?\d+)\s+(?\S+)\s+(?\S+)\s+(?\S+)\s+(?\d+)\s+(?\d+)\((?\d+)\)\s+(?\d+)\((?\d+)\)\s+(?\d+)\s+(?\S+)\s+(?\S+)\s+(?\S+)\((?\S+)\)\s+(?\S+)\s+(?\S+)\s*(?\S+)?\s*(?\S+)?\s*(?\S+)?\s*(?(?:N\/A)|(?:.*;)|\S+)?(?:\s+(?\S+)\s+(?\S+)\s+(?\d+\.\d+\.\d+\.\d+)\/(?\d+)->(?\d+\.\d+\.\d+\.\d+)\/(?\d+)\s+(?\S+)\s+(?\S+)\s+(?\S+))? [auto_kv_for_rt_flow_session_deny] ### Assumption taken that reason field will not have digits in it because reason field may contain spaces and there is no other way to extract it. ## FIELDS: session denied source-address/source-port->destination-address/destination-port 0xconnection-tag service-name protocol-id(icmp-type) policy-name source-zone-name destination-zone-name application nested-application username(roles) packet-incoming-interface encrypted reason session-id-32 application-category application-sub-category application-risk application-characteristics src-vrf-grp dst-vrf-grp REGEX = session\s+denied\s+(?\d+\.\d+\.\d+\.\d+)\/(?\d+)->(?\d+\.\d+\.\d+\.\d+)\/(?\d+)\s+(?(?:0x|0X)[0-9A-Fa-f]{0,16})\s+(?\S+)\s+(?\d+)\((?\d+)\)\s+(?\S+)\s+(?\S+)\s+(?\S+)\s+(?\S+)\s+(?\S+)\s+(?\S+)\((?\S+)\)\s+(?\S+)\s+(?\S+)\s+(?[\s^\D]+)\s*(?\d+)?\s*(?\S+)?\s*(?\S+)?\s*(?\S+)?\s*(?(?:N\/A)|(?:.*;)|\S+)?\s*(?\S+)?\s*(?\S+)? [auto_kv_for_apptrack_session_create] ## FIELDS: AppTrack session created source-address/source-port->destination-address/destination-port service-name application nested-application nat-source-address/nat-source-port->nat-destination-address/nat-destination-port src-nat-rule-name dst-nat-rule-name protocol-id policy-name source-zone-name destination-zone-name session-id-32 username roles encrypted destination-interface-name category sub-category src-vrf-grp dst-vrf-grp REGEX = AppTrack\s+session\s+created\s+(?\d+\.\d+\.\d+\.\d+)\/(?\d+)->(?\d+\.\d+\.\d+\.\d+)\/(?\d+)\s+(?\S+)\s+(?\S+)\s+(?\S+)\s+(?\d+\.\d+\.\d+\.\d+)\/(?\d+)->(?\d+\.\d+\.\d+\.\d+)\/(?\d+)\s+(?\S+)\s+(?\S+)\s+(?\d+)\s+(?\S+)\s+(?\S+)\s+(?\S+)\s+(?\d+)\s+(?\S+)\s+(?\S+)\s+(?\S+)\s*(?\S+)?\s*(?\S+)?\s*(?\S+)?\s*(?\S+)?\s*(?\S+)? [auto_kv_for_apptrack_session_vol_update] ## FIELDS: AppTrack volume update: source-address/source-port->destination-address/destination-port service-name application nested-application nat-source-address/nat-source-port->nat-destination-address/nat-destination-port src-nat-rule-name dst-nat-rule-name protocol-id policy-name source-zone-name destination-zone-name session-id-32 packets-from-client(bytes-from-client) packets-from-server(bytes-from-server) elapsed-time username roles encrypted destination-interface-name category sub-category src-vrf-grp dst-vrf-grp dscp-value apbr-rule-type REGEX = AppTrack\s+volume\s+update:\s+(?\d+\.\d+\.\d+\.\d+)\/(?\d+)->(?\d+\.\d+\.\d+\.\d+)\/(?\d+)\s+(?\S+)\s+(?\S+)\s+(?\S+)\s+(?\d+\.\d+\.\d+\.\d+)\/(?\d+)->(?\d+\.\d+\.\d+\.\d+)\/(?\d+)\s+(?\S+)\s+(?\S+)\s+(?\d+)\s+(?\S+)\s+(?\S+)\s+(?\S+)\s+(?\d+)\s+(?\d+)\((?\d+)\)\s+(?\d+)\((?\d+)\)\s+(?\d+)\s+(?\S+)\s+(?\S+)\s+(?\S+)\s*(?\S+)?\s*(?\S+)?\s*(?\S+)?\s*(?\S+)?\s*(?\S+)?\s*(?\S+)?\s*(?\S+)? [auto_kv_for_apptrack_session_close] ## FIELDS: AppTrack session closed reason: source-address/source-port->destination-address/destination-port service-name application nested-application nat-source-address/nat-source-port->nat-destination-address/nat-destination-port src-nat-rule-name dst-nat-rule-name protocol-id policy-name source-zone-name destination-zone-name session-id-32 packets-from-client(bytes-from-client) packets-from-server(bytes-from-server) elapsed-time username roles encrypted profile-name rule-name routing-instance destination-interface-name uplink-incoming-interface-name uplink-tx-bytes uplink-rx-bytes category sub-category apbr-policy-name multipath-rule-name src-vrf-grp dst-vrf-grp dscp-value apbr-rule-type REGEX = AppTrack\s+session\s+closed\s+(?[^:]+):\s+(?\d+\.\d+\.\d+\.\d+)\/(?\d+)->(?\d+\.\d+\.\d+\.\d+)\/(?\d+)\s+(?\S+)\s+(?\S+)\s+(?\S+)\s+(?\d+\.\d+\.\d+\.\d+)\/(?\d+)->(?\d+\.\d+\.\d+\.\d+)\/(?\d+)\s+(?\S+)\s+(?\S+)\s+(?\d+)\s+(?\S+)\s+(?\S+)\s+(?\S+)\s+(?\d+)\s+(?\d+)\((?\d+)\)\s+(?\d+)\((?\d+)\)\s+(?\d+)\s+(?\S+)\s+(?\S+)\s+(?\S+)\s*(?\S+)?\s*(?\S+)?\s*(?\S+)?\s*(?\S+)?(?:\s*(?\S+)\s+(?\d+)\s+(?\d+))?\s*(?\S+)?\s*(?\S+)?\s*(?\S+)?\s*(?\S+)?\s*(?\S+)?\s*(?\S+)?\s*(?\S+)?\s*(?\S+)? [auto_kv_for_rt_alg_wrn_cfg_need_ls] ## FIELDS: Logical-system logical-system-name: name ALG message REGEX = Logical-system\s+(?[^:]+):\s+(?\S+)\s+ALG\s+(?.*) [auto_kv_for_rt_utm_webfilter] ## FIELDS: source-address(source-port)->destination-address(destination-port) [ username roles [ application-sub-category [ urlcategory-risk ] ] ] REGEX = RT_UTM\s*:\s*(?:WEBFILTER_URL_PERMITTED|WEBFILTER_URL_BLOCKED).*\s+(?\d+\.\d+\.\d+\.\d+)\s*\(\s*(?\d{1,5})\s*\)\s*->\s*(?\d+\.\d+\.\d+\.\d+)\s*\(\s*(?\d{1,5})(?:.*username\s+(?\S+)\s+roles\s+(?\S+))?(?:\s+application\-sub\-category\s+(?\S+))?(?:\s+urlcategory\-risk\s+(?\S+))? [auto_kv_for_eswd_dai_failed] ##FIELDS: count type received, interface interface-name[index interface-device-index], vlan vlan-name[index vlan-id], sender ip/mac sender-address/mac1, receiver ip/mac destination-address/mac2 REGEX = (ESWD_DAI_FAILED):\s*(\d+)\s*(.*)\s*received,\s*interface\s*(.*)\s*\[index\s*(\d+)\],\s*vlan\s*(.*)\s*\[index\s*(\d+)\],\s*sender\s*ip\/mac\s*([^\/]+)\s*\/([^,]+)\s*,\s*receiver\s*ip\/mac\s*([^\/]+)\s*\/([^,]+)\s* FORMAT = message_tag::$1 count::$2 type::$3 interface_name::$4 interface_device_index::$5 vlan::$6 vlan_id::$7 src_ip::$8 src_mac::$9 dest_ip::$10 dest_mac::$11 protocol::"ARP" [auto_kv_for_fw_eth_ip] ##FIELDS: count type received, interface interface-name[index interface-device-index], vlan vlan-name[index vlan-id], sender ip/mac sender-address/mac1, receiver ip/mac destination-address/mac2 REGEX = (PFE_FW_SYSLOG_ETH_IP)\s*:\s*FW\s*:\s*([^\s]+)\s*([^\s]+)\s*([^\s]+)\s*([^->]+)\s*->\s*([^\s]+)\s*(\w+)\s*([^\s]+)\s*([^\s]+)\s*(\d+)\s*(\d+)\s*\((\d+)\s*packets\) FORMAT = message_tag::$1 interface_name::$2 action_name::$3 vlan::$4 src_mac::$5 dest_mac::$6 transport::$7 src_ip::$8 dest_ip::$9 src_port::$10 dest_port::$11 packets::$12 protocol_version::"ipv4" protocol::"ip" [auto_kv_for_eswd_stp_state_change_info] ## FIELDS: context-name state for interface interface-name context id instance-id changed from old-state to new-state REGEX = (ESWD_STP_STATE_CHANGE_INFO)\s*:\s*(.*)state\s*for\s*interface\s*(.*)\s*context\s*id\s*(\d+)\s+changed\s*from\s*(.*)\s*to\s*(.*) FORMAT = message_tag::$1 context_name::$2 interface_name::$3 instance_id::$4 old_state::$5 new_state::$6 result::"state changed" object_category::"interface" status::"success" object_attrs::"state" change_type::"network" [auto_kv_for_up_down] REGEX = rpd\[\d+\]\s*:\s* EVENT\s*<[^>]+>\s*(\S+)\s*index\s*\d+\s*<[^>]+>\s*address\s*\S+\s*.* FORMAT = interface_name::$1 service_name::"rpd" status::"success" result::"state changed" object_attrs::"state" change_type::"network" object_category::"interface" action::"modified" ###### Juniper JunOS AAMW ###### ## TRANSFORMS [force_sourcetype_for_junos_aamw] DEST_KEY = MetaData:Sourcetype REGEX = \s+RT_AAMW\s+\-\s+\w+\s+\[junos@2636 FORMAT = sourcetype::juniper:junos:aamw:structured ## REPORT [message_tag_for_junos_aamw] REGEX = RT_AAMW\s*[:-]\s*(?\w+) [dvc_for_junos_aamw] REGEX = (?\S+)\s+RT_AAMW [score_for_severity_junos_aamw] REGEX = \(\s*score\s+(?\d+)\s*\) ###### Juniper JunOS SECINTEL ###### ## TRANSFORMS [force_sourcetype_for_junos_secintel] DEST_KEY = MetaData:Sourcetype REGEX = \s+RT_SECINTEL\s+\-\s+\w+\s+\[junos@2636 FORMAT = sourcetype::juniper:junos:secintel:structured ## REPORT [message_tag_for_junos_secintel] REGEX = RT_SECINTEL\s*[:-]\s*(?\w+) [dvc_for_junos_secintel] REGEX = (?\S+)\s+RT_SECINTEL ## TRANSFORMS [force_sourcetype_for_junos_snmp] DEST_KEY = MetaData:Sourcetype REGEX = (?:SNMP_TRAP_LINK_UP|SNMP_TRAP_LINK_DOWN)\s*: FORMAT = sourcetype::juniper:junos:snmp ## REPORT [auto_kv_for_snmp_link_up_down_fields] ## FIELDS: ifIndex snmp-interface-index, ifAdminStatus admin-status, ifOperStatus operational-status, ifName interface-name REGEX = (SNMP_TRAP_LINK_(?:UP|DOWN))\s*:\s*ifIndex\s*(\d+),\s*ifAdminStatus\s*(.*),\s*ifOperStatus\s*(.*),\s*ifName\s*(.*) FORMAT = message_tag::$1 snmp_interface_index::$2 admin_status::$3 operational_status::$4 interface_name::$5 status::"success" result::"state changed" object_attrs::"state" change_type::"network" object_category::"interface" action::"modified" vendor_product::"Juniper JunOS"